CVE-2021-43805

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-43805
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-43805.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-43805
Aliases
Published
2021-12-07T18:15:07Z
Modified
2024-05-30T03:17:19.467728Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Solidus is a free, open-source ecommerce platform built on Rails. Versions of Solidus prior to 3.1.4, 3.0.4, and 2.11.13 have a denial of service vulnerability that could be exploited during a guest checkout. The regular expression used to validate a guest order's email was subject to exponential backtracking through a fragment like a.a. Versions 3.1.4, 3.0.4, and 2.11.13 have been patched to use a different regular expression. The maintainers added a check for email addresses that are no longer valid that will print information about any affected orders that exist. If a prompt upgrade is not an option, a workaround is available. It is possible to edit the file config/application.rb manually (with code provided by the maintainers in the GitHub Security Advisory) to check email validity.

References

Affected packages

Git / github.com/solidusio/solidus

Affected ranges

Type
GIT
Repo
https://github.com/solidusio/solidus
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0.0.pre
v1.0.0.pre2
v1.0.0.pre3
v1.1.0.beta1
v1.1.0.pre2

v2.*

v2.0.0.beta1
v2.10.0.beta1
v2.7.0
v2.9.0.rc.1

v3.*

v3.0.0.rc2